An efficient provably secure verifier-based authentication protocol using fractional chaotic maps in telecare medicine information systems

被引:0
|
作者
Preecha Yupapin
Chandrashekhar Meshram
Sharad Kumar Barve
Rabha W. Ibrahim
Muhammad Azeem Akbar
机构
[1] Institute of Vocational Education Northeastern 2,Department of Electrical Technology, School of Industrial Technology
[2] Jaywanti Haksar Government Post-Graduate College,Department of Post Graduate Studies and Research in Mathematics
[3] College of Chhindwara University,Department of Mathematics
[4] Pandit S. N. Shukla University Shahdol,Department of Computer Science and Mathematics
[5] Lebanese American University,The Software Engineering Department
[6] LUT University,undefined
来源
Soft Computing | 2023年 / 27卷
关键词
TMIS; Fractional chaotic maps; Provable security; Authentication; Data exchange and hash function;
D O I
暂无
中图分类号
学科分类号
摘要
The telecare medicine information systems (TMIS) offer a networking channel across public networks to access remote medical services and enable health care professionals and medical staff to make the best clinical decisions and treatments quickly. The verified-based three-party authentication protocol in TMIS for data exchange, authorizations only two patients/users to accumulation their verifiers in the record of authentication server calculated exhausting own password. The authentication scheme will then verify the verifiers of the patients/users and allow them to exchange electronic medical records securely and easily. In this paper, we provide an effective, provably secure, verified-based three-party authentication protocol for data exchange in TMIS utilising fractional chaotic maps. The authentication protocol provided does not use any public server keys and does not require the number of additional messages and rounds for key validation. The projected protocol is appropriate for TMIS because it has stronger security and cheaper communication costs than the corresponding verified-based approach. The development of smart cities can be accelerated with the proposed protocol.
引用
收藏
页码:6033 / 6047
页数:14
相关论文
共 50 条
  • [21] VSPAKE: Provably secure verifier-based PAKE protocol for client/server model in TLS ciphersuite
    Qi, Mingping
    JOURNAL OF SYSTEMS ARCHITECTURE, 2024, 148
  • [22] A Secure Chaotic Maps and Smart Cards Based Password Authentication and Key Agreement Scheme with User Anonymity for Telecare Medicine Information Systems
    Chun-Ta Li
    Cheng-Chi Lee
    Chi-Yao Weng
    Journal of Medical Systems, 2014, 38
  • [23] A Secure Chaotic Maps and Smart Cards Based Password Authentication and Key Agreement Scheme with User Anonymity for Telecare Medicine Information Systems
    Li, Chun-Ta
    Lee, Cheng-Chi
    Weng, Chi-Yao
    JOURNAL OF MEDICAL SYSTEMS, 2014, 38 (09)
  • [24] A Secure and Efficient Authentication and Key Agreement Scheme Based on ECC for Telecare Medicine Information Systems
    Xin Xu
    Ping Zhu
    Qiaoyan Wen
    Zhengping Jin
    Hua Zhang
    Lian He
    Journal of Medical Systems, 2014, 38
  • [25] A Secure and Efficient Authentication and Key Agreement Scheme Based on ECC for Telecare Medicine Information Systems
    Xu, Xin
    Zhu, Ping
    Wen, Qiaoyan
    Jin, Zhengping
    Zhang, Hua
    He, Lian
    JOURNAL OF MEDICAL SYSTEMS, 2014, 38 (01)
  • [26] A Novel Provably-Secure ECC-based Authentication and Key Management Protocol for Telecare Medical Information Systems
    Amintoosi, Haleh
    Nikooghadam, Mahdi
    2019 9TH INTERNATIONAL CONFERENCE ON COMPUTER AND KNOWLEDGE ENGINEERING (ICCKE 2019), 2019, : 85 - 90
  • [27] A Chaotic Map-based Authentication Scheme for Telecare Medicine Information Systems
    Xinhong Hao
    Jiantao Wang
    Qinghai Yang
    Xiaopeng Yan
    Ping Li
    Journal of Medical Systems, 2013, 37
  • [28] A More Secure Authentication Scheme for Telecare Medicine Information Systems
    He Debiao
    Chen Jianhua
    Zhang Rui
    JOURNAL OF MEDICAL SYSTEMS, 2012, 36 (03) : 1989 - 1995
  • [29] A Secure RFID Protocol for Telecare Medicine Information Systems using ECC
    Pokala, Jaya Prakash
    Reddy, M. ChandraMouli
    Jeelan, Abdul S.
    Bapana, Surekha
    Vorugunti, Chandra Sekhar
    PROCEEDINGS OF THE 2016 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2016, : 2295 - 2300
  • [30] A Secure Authentication and Key Agreement Protocol for Telecare Medicine Information System
    Li, Xuanang
    Zheng, Zhiming
    Zhang, Xiao
    2015 9TH INTERNATIONAL CONFERENCE ON NEXT GENERATION MOBILE APPLICATIONS, SERVICES AND TECHNOLOGIES (NGMAST 2015), 2015, : 275 - 281